Slashdot videos: Now with more Slashdot!

View

Discuss

Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

An anonymous reader writes "The Airlander 10 is the world's biggest aircraft. It's an airship that incorporates elements of blimps, planes, and hovercraft. Buoyed by a vast volume of helium, it's capable of cruising at a speed of 80 knots. It was built as a military venture, intended to be used for surveillance tasks. But as the war in Afghanistan wound down, government officials found they had no use for the airship. They ended up selling it back to the company who made it for $300,000 — after paying them $90 million to build it. Now, a small group of investors are trying to get it operational, in part to show people how safe the technology can be, and to hopefully spur construction of more airships. They say the Airlander 10 is capable of surviving a missile strike, but visions of the Hindenberg still loom large in our cultural memory."Link to Original Source

jones_supa (887896) writes "Luke Hodorowicz, the hard-working developer behind the townbuilding strategy computer game Banished, has designed a novel GPU shading language and written a compiler for it. The language has been christened "Shining Rock Shading Language" (SRSL) and it outputs the program in several other shading languages. The first goal for the language was to treat the vertex, fragment and geometry shader as a single program. The language sees the graphics pipeline as a stream of data, followed by some code, which outputs a stream of data, and then more code runs, and another stream of data is output. Body text of the shaders is very C-like and should be understood easily coming from other shading languages. SRSL has all the intrinsic functions you would expect from HLSL or GLSL. All types are HLSL-style. Loops and conditionals are available, but switch statements and global variables are seen redundant and not implemented. Luke's blog post tells more about the details of the language, complemented with examples."Link to Original Source

schwit1 (797399) writes "If the government puts a GPS tracker on you, your car, or any of your personal effects, it counts as a search—and is therefore protected by the Fourth Amendment.

The Supreme Court clarified and affirmed that law on Monday, when it ruled on Torrey Dale Grady v. North Carolina, before sending the case back to that state’s high court. The Court’s short but unanimous opinions helps make sense of how the Fourth Amendment, which protects against unreasonable search and seizure, interacts with the expanding technological powers of the U.S. government.

The only theory we discern [...] is that the State’s system of nonconsensual satellite-based monitoring does not entail a search within the meaning of the Fourth Amendment. That theory is inconsistent with this Court’s precedents.

An anonymous reader writes: We've been in a malware arms race since the 1990s. Malicious hackers keep building new viruses, worms, and trojan horses, while security vendors keep building better detection and removal algorithms to stop them. Botnets are becoming more powerful, and phishing techniques are always improving — but so are the mitigation strategies. There's been some back and forth, but it seems like the arms race has been pretty balanced, so far. My question: will the balance continue, or is one side likely to take the upper hand over the next decade or two? Which side is going to win? Do you imagine an internet, 20 years from now, where we don't have to worry about what links we click or what attachments we open? Or is it the other way around, with threats so hard to block and DDoS attacks so rampant that the internet of the future is not as useful as it is now?

An anonymous reader writes "We've been in a malware arms race since the 1990s. Malicious hackers keep building new viruses, worms, and trojan horses, while security vendors keep building better new detection and removal algorithms to stop them. Botnets are becoming more powerful, and phishing techniques are always improving — but so are the mitigation strategies. There's been some back and forth, but it seems like the arms race has been pretty balanced, so far. My question: will the balance continue, or is one side likely to take the upper hand over the next decade or two? Which side is going to win? Do you imagine an internet, 20 years from now, where we don't have to worry about what links we click or what attachments we open? Or is it the other way around, with threats so hard to block and DDoS attacks so rampant that the internet of the future is not as useful as it is now?"Link to Original Source

Jeba Qpt (3659127) writes "Compared to earlier researches, scientists at Washington University in St. Louis found a high tech PAM to view functions inside a living mouse brain at high speed then ever."

theodp writes: In Why My MOOC is Not Built on Video, GWU's Lorena Barba explains why the Practical Numerical Methods with Python course she and colleagues put together has but one video: "Why didn't we have more video? The short answer is budget and time: making good-quality videos is expensive & making simple yet effective educational videos is time consuming, if not necessarily costly. #NumericalMOOC was created on-the-fly, with little budget. But here's my point: expensive, high-production-value videos are not necessary to achieve a quality learning experience." When the cost of producing an MOOC can exceed $100,000 per course, Barba suggests educators pay heed to Donald Bligh's 1971 observation that "dazzling presentations do not necessarily result in learning." So what would Barba do? "We designed the central learning experience [of #NumericalMOOC] around a set of IPython Notebooks," she explains, "and meaningful yet achievable mini-projects for students. I guarantee learning results to any student that fully engages with these!"

An anonymous reader writes "Scientist at the Univeristy of Nottingham use a recipe from an ancient medical text to successfully kill the golden staph bacteria. Bald's Leechbook calls for leeks, garlic, brass, wine and other ingredients to create an eye salve for curing an infected eyelash. The salve has been found to be effective in killing the superbug staphylococcus aureusat at least as well any modern remedy."Link to Original Source

recaptcha (4064357) writes "Today one of my fellow workers has announced he has found another job and will be leaving our company in two weeks' time. This is all above board and there is no disgruntled employee scenario here; he is simply working through his notice period and finishing up some jobs. I have already set some fileserver folders to Read-Only for him and taken a backup of his mailbox in case he empties it on the last day. Which best practices do you follow that will prevent a resigning user from causing any damage (deliberately or not) in these last days of employment before his account is disabled?"

schwit1 (797399) writes "The May 6 Atlas 5 launch will carry one of the Air Force’s two X-37B mini-shuttles on a new mission in space.

The Air Force won’t yet confirm which of the Boeing-built spaceplanes will be making the voyage. The first craft returned in October from a 675-day mission in space following a 224 day trek in 2010. OTV No. 2 spent 469 days in space in 2011-2012 on its only mission so far. “The program selects the Orbital Test Vehicle for each activity based upon the experiment objectives,” said Capt. Chris Hoyler, an Air Force spokesperson. “Each OTV mission builds upon previous on-orbit demonstrations and expands the test envelope of the vehicle. The test mission furthers the development of the concept of operations for reusable space vehicles.”

There are indications that the Air Force wants to attempt landing the shuttle at Kennedy this time."

An anonymous reader writes Dan McKinley, a long-time Etsy engineer who now works at online payment processor Stripe, argues that the boring technology option is usually your best choice for a new project. He says, "Let's say every company gets about three innovation tokens. You can spend these however you want, but the supply is fixed for a long while. You might get a few more after you achieve a certain level of stability and maturity, but the general tendency is to overestimate the contents of your wallet. Clearly this model is approximate, but I think it helps. If you choose to write your website in NodeJS, you just spent one of your innovation tokens. If you choose to use MongoDB, you just spent one of your innovation tokens. If you choose to use service discovery tech that's existed for a year or less, you just spent one of your innovation tokens. If you choose to write your own database, oh god, you're in trouble. ... The nice thing about boringness (so constrained) is that the capabilities of these things are well understood. But more importantly, their failure modes are well understood."

An anonymous reader writes "Dan McKinley, a long-time Etsy engineer who now works at online payment processor Stripe, argues that the boring technology option is usually your best choice for a new project. He says, "Let's say every company gets about three innovation tokens. You can spend these however you want, but the supply is fixed for a long while. You might get a few more after you achieve a certain level of stability and maturity, but the general tendency is to overestimate the contents of your wallet. Clearly this model is approximate, but I think it helps. If you choose to write your website in NodeJS, you just spent one of your innovation tokens. If you choose to use MongoDB, you just spent one of your innovation tokens. If you choose to use service discovery tech that's existed for a year or less, you just spent one of your innovation tokens. If you choose to write your own database, oh god, you're in trouble.... The nice thing about boringness (so constrained) is that the capabilities of these things are well understood. But more importantly, their failure modes are well understood.""Link to Original Source